As we are familiar with computer viruses, how their code internally works, we will be going into little in-depth about what botnets and rootkits are and how they work; what are their types and where hackers use these terms. First of all, we will be dealing with Rootkits.
What is Rootkit?
Rootkits are a collection of tools or sets of applications that allow the administrator-level access to a computer or a network. These rootkits are fed into the host computer by a cracker (malicious hacker) either by exploiting a known vulnerability of the system or by cracking the password. These rootkits hide their presence using some of the low layers of the operating system, which makes them almost undetectable by standard anti-malware software. So the name implies where 'rootkit' is a compound of two words 'root' and 'kit' where root describes the most privileged user on the computer, and kit describes the set of tools to implement. The rootkit has a synonym with malware, which describes malware with root capabilities.
Root Modes of Windows Operating System
The kernel is the primary component of an operating system. It serves as an intermediate connector between the application and the hardware. The Windows kernel has been designed with flexibility in mind. The windows OS kernel code runs in the highest privileged mode in the system, which is the Kernel-mode. As because all software and programs don't require system resources and hardware manipulation, a lower privileged mode also exists knows as User-mode where this application runs.
Types of Rootkit
As in the Windows operating system, there are two modes a code can execute in: the unrestricted kernel mode and the private, restricted user mode. Rootkits can exist in both of these modes. Rootkits can be either legitimate or malicious; i.e., they may get installed as a part of the legitimate application or through some Trojans via some suspicious email attachments. There are two types of windows rootkits which are aptly called:
Techniques Used by Rootkits
Rootkits use three different techniques that were coded in them. These are:
Countermeasures Against Rootkits
Though some vendors exist in the market, which sells software that can detect the presence of rootkit such as Microsoft, Sysinternals, Symantec, F-secure, etc. If a rootkit is detected, the only sure way to get rid of this is to completely erase the computer's hard drive or format the operating system to reinstall it.
Previous Chapter : Computer Virus ❯ Next Chapter : Botnet ❯